首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   14608篇
  免费   1580篇
  国内免费   1332篇
电工技术   770篇
技术理论   10篇
综合类   1699篇
化学工业   474篇
金属工艺   200篇
机械仪表   497篇
建筑科学   2170篇
矿业工程   662篇
能源动力   1026篇
轻工业   548篇
水利工程   582篇
石油天然气   402篇
武器工业   82篇
无线电   2105篇
一般工业技术   655篇
冶金工业   608篇
原子能技术   37篇
自动化技术   4993篇
  2024年   24篇
  2023年   174篇
  2022年   377篇
  2021年   353篇
  2020年   475篇
  2019年   343篇
  2018年   315篇
  2017年   339篇
  2016年   429篇
  2015年   548篇
  2014年   1052篇
  2013年   1119篇
  2012年   1137篇
  2011年   1274篇
  2010年   1074篇
  2009年   1049篇
  2008年   1030篇
  2007年   1186篇
  2006年   1049篇
  2005年   879篇
  2004年   716篇
  2003年   541篇
  2002年   440篇
  2001年   337篇
  2000年   250篇
  1999年   204篇
  1998年   143篇
  1997年   115篇
  1996年   101篇
  1995年   67篇
  1994年   45篇
  1993年   43篇
  1992年   27篇
  1991年   24篇
  1990年   27篇
  1989年   23篇
  1988年   19篇
  1987年   8篇
  1986年   7篇
  1985年   27篇
  1984年   20篇
  1983年   11篇
  1982年   10篇
  1981年   10篇
  1980年   5篇
  1979年   8篇
  1975年   7篇
  1966年   7篇
  1964年   4篇
  1956年   6篇
排序方式: 共有10000条查询结果,搜索用时 218 毫秒
1.
结合全球倡导的营养导向型农业和功能性食品的内容,首次提出“功能性小麦品种”的概念,将其定义为“含有对人体健康有益的活性成分,可调节人体有益代谢,能给人体健康带来某种益处或满足特定人群的特殊需求,同时可以作为日常食物的口感正常、无毒副作用的小麦品种类型”;结合疫情警示和我国进入后工业时代后,人们需求必将由“吃得饱”、“吃得好”向“吃得健康”转变,因而提出继高产品种、优质品种之后培育“功能性小麦品种”的育种目标。根据多年关于小麦淀粉、蛋白、酯类和其他成分的功能研究结果,介绍新育成的“麦黄酮”、“高色素”、“高抗性淀粉”、“富锌”、“低醇溶蛋白”和“低植酸”等功能性小麦新品种(系)的营养特性和农艺产量状况;根据“健康中国2030”规划等国家战略,进行“功能性品种培育是解决我国功能性食品‘卡脖子’的关键基础,一种功能性品种可以形成一类功能性食品,多种功能性品种可以形成我国功能性面制品产业,推动我国整个食品工业的发展”的前景展望;根据功能性品种及其食品的稳定性和可靠性是产品和市场的“生命线”,从对消费者负责的高度,提出关于“功能性农作物品种审定导向和组建功能性成分检测机构;编制有关功能性品种和食品的国家或行业标准,设立功能性食品和功能性农作物品种的商业标志,保证我国功能性农作物品种及其食品健康发展”等方面的具体建议。  相似文献   
2.
The ways in which environmental priorities are framed are varied and influenced by political forces. One technological advance--the proliferation of government open data portals (ODPs)--has the potential to improve governance through facilitating access to data. Yet it is also known that the data hosted on ODPs may simply reflect the goals and interests of multiple levels of political power. In this article, I use traditional statistical correlation and regression techniques along with newer natural language processing and machine learning algorithms to analyze the corpus of datasets hosted on government ODPs (total: 49,066) to extract patterns that relate scales of governance and political liberalism/conservatism to the priorities and meaning attached to environmental issues. I find that state-level and municipal-level ODPs host different categories of environmental datasets, with municipal-level ODPs generally hosting more datasets pertaining to services and amenities and state-level ODPs hosting more datasets pertaining to resource protection and extraction. Stronger trends were observed for the influences of political conservatism/liberalism among state-level ODPs than for municipal-level ODPs.  相似文献   
3.
在传统密码学应用中,人们总假定终端是安全的,并且敌手只存在于通信信道上。然而,主流的恶意软件和系统漏洞给终端安全带来了严重和直接的威胁和挑战,例如容易遭受存储内容被病毒破坏、随机数发生器被腐化等各种攻击。更糟糕的是,协议会话通常有较长的生存期,因此需要在较长的时间内存储与会话相关的秘密信息。在这种情况下,有必要设计高强度的安全协议,以对抗可以暴露存储内容和中间计算结果(包括随机数)的敌手。棘轮密钥交换是解决这一问题的一个基本工具。文中综述了密码本原——棘轮密钥交换,包括单向、半双向和双向等棘轮密钥交换的定义、模型及构造,并展望了棘轮密钥交换的未来发展趋势。  相似文献   
4.
An increasing number of social media and networking platforms have been widely used. People usually post the online comments to share their own opinions on the networking platforms with social media. Business companies are increasingly seeking effective ways to mine what people think and feel regarding their products and services. How to correctly understand the online customers’ reviews becomes an important issue. This study aims to propose a method with the aspect-oriented Petri nets (AOPN) to improve the examination correctness without changing any process and program. We collect those comments from the online reviews with Scrapy tools, perform sentiment analysis using SnowNLP, and examine the analysis results to improve the correctness. In this paper, we apply our method for a case of the online movie comments. The experimental results have shown that AOPN is helpful for the sentiment analysis and verifying its correctness.  相似文献   
5.
随着交通的日益发展,大跨度跨线连续刚构桥梁修建越来越多。本文结合潼湖特大桥跨潮莞高速(88+160+88)m连续刚构施工的成功实践,详细阐述了该桥的施工关键及其梁体施工的线型控制,跨既有公路施工防护及混凝土施工等关键施工技术,可供类似工程参考。  相似文献   
6.
Lightweight ciphers are increasingly employed in cryptography because of the high demand for secure data transmission in wireless sensor network, embedded devices, and Internet of Things. The PRESENT algorithm as an ultra-lightweight block cipher provides better solution for secure hardware cryptography with low power consumption and minimum resource. This study generates the key using key rotation and substitution method, which contains key rotation, key switching, and binary-coded decimal-based key generation used in image encryption. The key rotation and substitution-based PRESENT architecture is proposed to increase security level for data stream and randomness in cipher through providing high resistance to attacks. Lookup table is used to design the key scheduling module, thus reducing the area of architecture. Field-programmable gate array (FPGA) performances are evaluated for the proposed and conventional methods. In Virtex 6 device, the proposed key rotation and substitution PRESENT architecture occupied 72 lookup tables, 65 flip flops, and 35 slices which are comparably less to the existing architecture.  相似文献   
7.
Electric vehicles (EVs) are considered a promising alternative to conventional vehicles (CVs) to alleviate the oil crisis and reduce urban air pollution and carbon emissions. Consumers usually focus on the tangible cost when choosing an EV or CV but overlook the time cost for restricting purchase or driving and the environmental cost from gas emissions, falling to have a comprehensive understanding of the economic competitiveness of CVs and EVs. In this study, a life cycle cost model for vehicles is conducted to express traffic and environmental policies in monetary terms, which are called intangible cost and external cost, respectively. Battery electric vehicles (BEVs), fuel cell electric vehicles (FCEVs), and CVs are compared in four first-tier, four new first-tier, and 4 s-tier and below cities in China. The comparison shows that BEVs and FCEVs in most cities are incomparable with CVs in terms of tangible cost. However, the prominent traffic and environmental policies in first-tier cities, especially in Beijing and Shanghai, greatly increase the intangible and external costs of CVs, making consumers more inclined to purchase BEVs and FCEVs. The main policy benefits of BEVs and FCEVs come from three aspects: government subsidies, purchase and driving restrictions, and environmental taxes. With the predictable reduction in government subsidies, traffic and environmental policies present important factors influencing the competitiveness of BEVs and FCEVs. In first-tier cities, BEVs and FCEVs already have a competitive foundation for large-scale promotion. In new first-tier and second-tier and below cities, stricter traffic and environmental policies need to be formulated to offset the negative impact of the reduction in government subsidies on the competitiveness of BEVs and FCEVs. Additionally, a sensitivity analysis reveals that increasing the mileage and reducing fuel prices can significantly improve the competitiveness of BEVs and FCEVs, respectively.  相似文献   
8.
无证书签名具有基于身份密码体制和传统公钥密码体制的优点,可解决复杂的公钥证书管理和密钥托管问题.Wu和Jing提出了一种强不可伪造的无证书签名方案,其安全性不依赖于理想的随机预言机.针对该方案的安全性,提出了两类伪造攻击.分析结果表明,该方案无法实现强不可伪造性,并在"malicious-but-passive"的密钥生成中心攻击下也是不安全的.为了提升该方案的安全性,设计了一个改进的无证书签名方案.在标准模型中证明了改进的方案对于适应性选择消息攻击是强不可伪造的,还能抵抗恶意的密钥生成中心攻击.此外,改进的方案具有较低的计算开销和较短的私钥长度,可应用于区块链、车联网、无线体域网等领域.  相似文献   
9.
We conceptualized security-related stress (SRS) and proposed a theoretical model linking SRS, discrete emotions, coping response, and information security policy (ISP) compliance. We used an experience sampling design, wherein 138 professionals completed surveys. We observed that SRS had a positive association with frustration and fatigue, and these negative emotions were associated with neutralization of ISP violations. Additionally, frustration and fatigue make employees more likely to follow through on their rationalizations of ISP violations by decreased ISP compliance. Our findings provide evidence that neutralization is not a completely stable phenomenon but can vary within individuals from one time point to another.  相似文献   
10.
As the development of cloud computing and the convenience of wireless sensor netowrks, smart devices are widely used in daily life, but the security issues of the smart devices have not been well resolved. In this paper, we present a new NTRU-type public-key cryptosystem over the binary field. Specifically, the security of our scheme relies on the computational intractability of an unbalanced sparse polynomial ratio problem (DUSPR). Through theoretical analysis, we prove the correctness of our proposed cryptosystem. Furthermore, we implement our scheme using the NTL library, and conduct a group of experiments to evaluate the capabilities and consuming time of encryption and decryption. Our experiments result demonstrates that the NTRU-type public-key cryptosystem over the binary field is relatively practical and effective.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号